Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Applications
    • Applications
    • Cybersecurity
    • IT Management
    • Networking

    Enterprises Must Think Strategically About Security

    Written by

    eWEEK EDITORS
    Published July 11, 2005
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      The single most common—and most damaging—error in IT security practice is the failure to approach it from a strategic perspective.

      IT security is a complex and competitive endeavor. Attempting to address individual issues without a clear and consistent sense of the larger picture is like trying to play chess without being able to see the board.

      Nevertheless, businesses large and small continue to tackle problems and potential problems on an ad hoc basis, facing them one by one once they are perceived as crises. As a result, they not only end up with bad security, but spend far more than they should in the process.

      So, if this is such an obvious and common mistake, why do people keep making it?

      First of all, contrary to common belief, information security is not a technology problem. While it has a major technological component, it is a systemwide issue that touches on nearly every aspect of business practice and planning. As such, strategic planning requires an active collaboration between IT and management staff.

      IT staff needs to educate management about the nature and degree of security risks, plan appropriate responses, and weigh the technical benefits and costs of various defensive approaches.

      Management, on the other hand, needs to work with the IT staff to make informed decisions about appropriate levels of risk tolerance, review nontechnical security measures, and incorporate both technical and nontechnical measures into broader business practices.

      This kind of collaboration would be exceedingly difficult even under the best of circumstances. And security issues definitely do not present the best of circumstances. While good security may prevent serious losses, it very rarely brings in money. Security risks, moreover, are notoriously difficult to predict and quantify.

      /zimages/6/28571.gifClick here to read about why recent high-profile data thefts have prompted enterprises to search for ways to fortify network security.

      As such, management staff tends to view preventive security measures as something of a luxury, particularly if they have never experienced a major security breach. Indeed, they often tend to view IT staffers who advocate for improved security as alarmist or paranoid (though, to be fair, this view is not always unjustified).

      IT staffers, for their part, often fail to place security concerns in context, focusing on technology issues to the exclusion of all else.

      Next Page: Winning management support.

      Management Support


      This makes communication with nontechnical staff even more difficult and can further feed the perception that IT staff is alarmist because it advocates proposals that, while technically elegant, are burdensome or otherwise unfeasible in practice.

      On the other hand, IT staffers are often reluctant to aggressively advocate enhanced security measures. It is hard enough for IT staff to meet all of the demands of modern business networks without taking on tasks that management does not consider a priority.

      The most obvious consequence of a lack of strategic planning is an underestimation of security risks, and a resulting failure to allocate sufficient time or resources to addressing them. Poor security often has no obvious impact on a business until something goes seriously wrong.

      Damaging security breaches often go completely unnoticed until well after the fact. In the absence of a strategic plan, it is all too easy to continually postpone addressing security issues—particularly regular assessment and maintenance—until more urgent concerns are dealt with. Unfortunately, very few businesses ever run out of urgent concerns.

      /zimages/6/28571.gifClick here to read about why small and midsized businesses need to pay closer attention to network and data security.

      These habits tend to reinforce themselves over time; the longer it has been since anyone has had to deal with security, the less likely it is to end up on a budget or at the top of anyones to-do list. Meanwhile, staff is more likely to deactivate or circumvent various security measures in the name of convenience or new functionality.

      A less obvious but equally damaging consequence of an ad hoc approach is the haphazard misallocation of security resources.

      When security issues do attract attention, businesses without a strategic plan typically find themselves operating in “crisis mode” and are often unable even to assess the nature or applicability of the issue (never mind responding in a sensible, effective or cost-appropriate manner).

      This stance leaves businesses vulnerable not only to the various parties seeking to breach their security, but to unrealistic marketing pitches and media hype as well.

      Next Page: Reacting to a crisis.

      Crisis Mode

      In the event of a significant breach, the best that can usually be hoped for from an unplanned crisis response is a costly investment in damage mitigation and remedial measures to “shore up” failed security.

      Even when such responses are effective, they provide little or no opportunity to move beyond the immediate concern and prevent future problems. Thus staff is forced to move from one crisis to the next, allocating security resources based entirely upon the order in which problems arise.

      This is a best-case scenario, assuming an effective response. In the rush of a crisis situation, it is all too easy to overlook key details and allow current and/or future adversaries to circumvent your new security measures. It is all too easy to rely on vendors more interested in selling their product than in addressing your specific needs.

      Its just as easy to get caught up in media hype around a purported threat that may or may not have any bearing on your circumstances. It takes only a small error in these circumstances to end up spending large sums with no resulting improvement in real-world security.

      Read more

      here

      about the security breach at MasterCard International that exposed the payment records of more than 40 million credit card holders.

      In many cases, IT security insurance can prove to be an extremely effective approach to breaking the security deadlock. Like any other vendor, insurance brokers are primarily interested in selling a product, and they may or may not be able to tell you anything new about security practices.

      They do, however, specialize in evaluating, managing and quantifying risk. As a result, they can be very helpful in identifying the appropriate level of risk for a given business and mapping out the most cost-effective way to achieve that level.

      By placing dollar values on security threats, they also can be invaluable in educating management. Last but not least, of course, they provide compensation for damages in the event of a security failure.

      Unfortunately, insurance is often not a practical option. Instead it typically falls on the IT staff to cajole management into a strategic planning process. In doing so, it is crucial to keep in mind why management tends to be reluctant to address the issue, and what biases IT staff may bring to the table.

      Keep the discussion focused on the need to allocate resources appropriately and prevent “crisis mode” waste, rather than resorting to scare tactics—justified or not.

      The goal of a good planning process is not to turn a network into an impenetrable fortress, but to make conscious, informed decisions. How much risk to tolerate? What kinds of costs and disruptions to tolerate? How much to spend and how to spend it.?

      Enterprises will make these decisions one way or another. Taking a strategic view prevents them from being made by default, or by accident.

      Contributing editor David Raikow has worked in the IT industry for 20 years as a systems administrator, Web designer and developer, Webmaster, consultant, and—most recently—a writer. David primarily covers issues related to network security. He holds a law degree from UC Berkeley and occasionally writes about legislative and litigation-related topics. He can be reached at eWEEK@think-spot.com.

      Check out eWEEK.coms for the latest security news, reviews and analysis. And for insights on security coverage around the Web, take a look at eWEEK.com Security Center Editor Larry Seltzers Weblog.

      eWEEK EDITORS
      eWEEK EDITORS
      eWeek editors publish top thought leaders and leading experts in emerging technology across a wide variety of Enterprise B2B sectors. Our focus is providing actionable information for today’s technology decision makers.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×